@@ -391,21 +391,22 @@ def set_common_sanitizers() -> None:
391391
392392 # Body regex sanitizers for sensitive patterns in request/response bodies
393393 batch_sanitizers [Sanitizer .BODY_REGEX ] = [
394- {"regex" : "(client_id=)[^&]+" , "value" : "$1sanitized" },
395- {"regex" : "(client_secret=)[^&]+" , "value" : "$1sanitized" },
396- {"regex" : "(client_assertion=)[^&]+" , "value" : "$1sanitized" },
397- {"regex" : "(?:[\\ ?&](sv|sig|se|srt|ss|sp)=)(?<secret>(([^&\\ s]*)))" , "value" : SANITIZED },
394+ {"regex" : "(client_id=)(?<secret>[^&\\ \" ]+)" , "group_for_replace" : "secret" , "value" : SANITIZED },
395+ {"regex" : "client_secret=(?<secret>[^&\\ \" ]+)" , "group_for_replace" : "secret" , "value" : SANITIZED },
396+ {"regex" : "client_assertion=(?<secret>[^&\\ \" ]+)" , "group_for_replace" : "secret" , "value" : SANITIZED },
397+ {"regex" : "(?:[\\ ?&](sv|sig|se|srt|ss|st|sp)=)(?<secret>[^&\\ \" \\ s]*)" ,
398+ "group_for_replace" : "secret" , "value" : SANITIZED },
398399 {"regex" : "refresh_token=(?<group>.*?)(?=&|$)" , "group_for_replace" : "group" , "value" : SANITIZED },
399400 {"regex" : "access_token=(?<group>.*?)(?=&|$)" , "group_for_replace" : "group" , "value" : SANITIZED },
400- {"regex" : "token=(?<token>[^\\ u0026 ]+)($|\\ u0026 )" , "group_for_replace" : "token" , "value" : SANITIZED },
401- {"regex" : "-----BEGIN PRIVATE KEY-----\\ n(.+\\ n)*-----END PRIVATE KEY-----\\ n" , "value" : SANITIZED },
402- {"regex" : "(?<=<UserDelegationKey>).*?(?:<SignedTid >)(.*)(?:</SignedTid>) " , "value" : SANITIZED },
403- {"regex" : "(?<=<UserDelegationKey>).*?(?:<SignedOid >)(.*)(?:</SignedOid>) " , "value" : SANITIZED },
404- {"regex" : "(?<=<UserDelegationKey>).*?(?:<Value >)(.*)(?:</Value>) " , "value" : SANITIZED },
405- {"regex" : "(?:Password=)(.*?)(?:;)" , "value" : SANITIZED },
406- {"regex" : "(?:User ID=)(.*?)(?:;)" , "value" : SANITIZED },
407- {"regex" : "(?:<PrimaryKey>)(.*)(?:</PrimaryKey>)" , "value" : SANITIZED },
408- {"regex" : "(?:<SecondaryKey>)(.*)(?:</SecondaryKey>)" , "value" : SANITIZED },
401+ {"regex" : "token=(?<token>[^& \\ \" ]+)($|& )" , "group_for_replace" : "token" , "value" : SANITIZED },
402+ {"regex" : "-----BEGIN PRIVATE KEY-----\\ n(?<cert> .+\\ n)*-----END PRIVATE KEY-----\\ n" , "group_for_replace" : "cert " , "value" : SANITIZED },
403+ {"regex" : "(?<=<UserDelegationKey>).*?(?:<Value >)(?<group> .*)(?:</Value>)" , "group_for_replace" : "group " , "value" : SANITIZED },
404+ {"regex" : "(?<=<UserDelegationKey>).*?(?:<SignedTid >)(?<group> .*)(?:</SignedTid>)" , "group_for_replace" : "group " , "value" : SANITIZED },
405+ {"regex" : "(?<=<UserDelegationKey>).*?(?:<SignedOid >)(?<group> .*)(?:</SignedOid>)" , "group_for_replace" : "group " , "value" : SANITIZED },
406+ {"regex" : "(?:Password=)(?<pwd> .*?)(?:;)" , "group_for_replace" : "pwd " , "value" : SANITIZED },
407+ {"regex" : "(?:User ID=)(?<id> .*?)(?:;)" , "group_for_replace" : "id " , "value" : SANITIZED },
408+ {"regex" : "(?:<PrimaryKey>)(?<key> .*)(?:</PrimaryKey>)" , "group_for_replace" : "key " , "value" : SANITIZED },
409+ {"regex" : "(?:<SecondaryKey>)(?<key> .*)(?:</SecondaryKey>)" , "group_for_replace" : "key " , "value" : SANITIZED },
409410 ]
410411
411412 # General regex sanitizers for sensitive patterns throughout interactions
0 commit comments